Vulnerability

VMware Rolls a Fix for Formerly Critical Zero-Day Bug

VMware has issued a full patch and revised the severity level of the NSA-reported vulnerability to “important.” VMware has patched a zero-day bug that was...

As Modern Mobile Enables Remote Work, It Also Demands Security

Lookout’s Hank Schless discusses accelerated threats to mobile endpoints in the age of COVID-19-sparked remote working. Smartphones, tablets, collaboration apps and other modern framework tools...

Xerox DocuShare Bugs Allow Data Leaks

CISA warns the leading enterprise document management platform is open to attack and urges companies to apply fixes. Xerox issued a fix for two vulnerabilities...

Google Play Apps Remain Vulnerable to High-Severity Flaw

Patches for a flaw (CVE-2020-8913) in the Google Play Core Library have not been implemented by several popular Google Play apps, including Cisco Teams and...

Xerox DocuShare Bugs Allows Data Leaks

CISA warns the leading enterprise document management platform is open to attack and urges companies to apply fixes. Xerox issued a fix for two vulnerabilities...

Cloud Security

CISOs face a whole new budget world this year

It’s budget season for many CISOs, and cybersecurity investment for 2021 looks a lot different than it did a year ago. In late 2019, organizations...

CISOs face a whole new budget world this season

It’s budget season for many CISOs, and cybersecurity investment for 2021 looks a lot different than it did a year ago. In late 2019, organizations...

Cloud security mapping startup Lightspin comes out of stealth

An image of stratocumulus clouds from space. (ISS Expedition 34 CrewImage Science & Analysis Laboratory, NASA Johnson Space Center. Derivative work including grading, lens profile...

Cloud security mapping startup Lightspeed comes out of stealth

An image of stratocumulus clouds from space. (ISS Expedition 34 CrewImage Science & Analysis Laboratory, NASA Johnson Space Center. Derivative work including grading, lens profile...

Attackers can abuse a misconfigured IAM role across 16 Amazon services

AWS services that can be potentially hit by attackers include Amazon Simple Storage Service, Amazon Key Management Service and Amazon Simple Queue Service. (Photo by...

Attackers can abuse a misconfigured IAM role across 16 AWS services

AWS services that can be potentially hit by attackers include Amazon Simple Storage Service, Amazon Key Management Service and Amazon Simple Queue Service. (Photo by...